Chapter 4. Troubleshoot restricted environments and proxy configuration issues


Deploy Red Hat build of Podman Desktop in restricted or proxy-dependent networks by resolving installation failures in air-gapped environments. Fix VPN-related connectivity issues by enabling the User Mode Networking option. You also find steps to route container traffic through corporate proxies.

Issue
When using a Virtual Private Network (VPN), the host computer cannot access resources exposed by the Podman machine because the machine receives a distinct network address.
Solution
When setting up the Podman machine, enable the User mode networking (traffic relayed by a user process) option. This routes the network traffic through your host, allowing access to the machine’s exposed resources.
Issue
Your host machine has internet access, but containers started in Red Hat build of Podman Desktop cannot reach the network. This happens because containers do not automatically receive the proxy settings from the applicaton UI or operating system.
Solution
To manually configure a proxy for your containers, refer to Configure proxy settings on macOS and Windows and Configure proxy settings on Linux.
Issue
When using a proxy that requires custom Certificate Authorities (CAs), the Podman machine fails to verify secure connections.
Solution
To use a custom CA with your proxy, refer to Configure proxy settings on macOS and Windows and Configure proxy settings on Linux.
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top